2024-06-06, 06:25 PM
(This post was last modified: 2024-06-06, 06:25 PM by TheDreadPirate.)
You have to keep in mind that we are all small fries. No hacker with any skill is going after us.
Keep your system up-to-date
Use a reverse proxy
Use legit certs for https
Hide usernames from the Jellyfin login screen
Use non-standard https port to minimize randos finding your jellyfin
Setup fail2ban to ban the rare rando that finds your server
Running on a non-standard https port is big, IMO. I've yet to see any failed login attempts on my Jellyfin from rando IPs.
Keep your system up-to-date
Use a reverse proxy
Use legit certs for https
Hide usernames from the Jellyfin login screen
Use non-standard https port to minimize randos finding your jellyfin
Setup fail2ban to ban the rare rando that finds your server
Running on a non-standard https port is big, IMO. I've yet to see any failed login attempts on my Jellyfin from rando IPs.
Jellyfin 10.9.11
Ubuntu 24.04 LTS (bare metal)
Intel i3 12100 on Asus Prime H610M-E D4 mATX
32GB DDR4-3600
Intel Arc A380
OS drive - SK Hynix P41 1TB
Storage
WD Green 3TB (Samba shares)
WD Red 3TB CMR (WIP Media, Test libraries)
3x WD Red Pro 6TB CMR in RAIDZ1 (JF Library)
Fractal Meshify 2
Corsair CX430
Ubuntu 24.04 LTS (bare metal)
Intel i3 12100 on Asus Prime H610M-E D4 mATX
32GB DDR4-3600
Intel Arc A380
OS drive - SK Hynix P41 1TB
Storage
WD Green 3TB (Samba shares)
WD Red 3TB CMR (WIP Media, Test libraries)
3x WD Red Pro 6TB CMR in RAIDZ1 (JF Library)
Fractal Meshify 2
Corsair CX430